From 027d47f36d5e77b24a925d19c987fc43151baa17 Mon Sep 17 00:00:00 2001 From: djm <> Date: Thu, 3 Nov 2011 02:32:24 +0000 Subject: import OpenSSL 1.0.0e --- src/lib/libssl/src/CHANGES | 136 ++++++- src/lib/libssl/src/Configure | 15 + src/lib/libssl/src/FAQ | 53 ++- src/lib/libssl/src/INSTALL.VMS | 52 ++- src/lib/libssl/src/INSTALL.W32 | 22 +- src/lib/libssl/src/LICENSE | 2 +- src/lib/libssl/src/Makefile | 2 +- src/lib/libssl/src/NEWS | 41 ++- src/lib/libssl/src/PROBLEMS | 4 +- src/lib/libssl/src/README | 4 +- src/lib/libssl/src/VMS/install-vms.com | 67 ++++ src/lib/libssl/src/VMS/mkshared.com | 227 ++++++++---- src/lib/libssl/src/VMS/openssl_startup.com | 108 ++++++ src/lib/libssl/src/VMS/openssl_undo.com | 20 + src/lib/libssl/src/apps/CA.com | 98 ++--- src/lib/libssl/src/apps/apps.c | 11 +- src/lib/libssl/src/apps/asn1pars.c | 1 + src/lib/libssl/src/apps/dh.c | 5 +- src/lib/libssl/src/apps/dhparam.c | 5 +- src/lib/libssl/src/apps/dsaparam.c | 9 +- src/lib/libssl/src/apps/enc.c | 9 +- src/lib/libssl/src/apps/gendh.c | 5 +- src/lib/libssl/src/apps/gendsa.c | 5 +- src/lib/libssl/src/apps/install-apps.com | 107 ++++++ src/lib/libssl/src/apps/makeapps.com | 316 ++++++++++++---- src/lib/libssl/src/apps/openssl.c | 64 +++- src/lib/libssl/src/apps/pkcs12.c | 2 +- src/lib/libssl/src/apps/pkcs7.c | 5 +- src/lib/libssl/src/apps/rand.c | 5 +- src/lib/libssl/src/apps/s_server.c | 5 +- src/lib/libssl/src/apps/s_socket.c | 7 +- src/lib/libssl/src/apps/speed.c | 14 +- src/lib/libssl/src/apps/x509.c | 2 - src/lib/libssl/src/config | 4 + src/lib/libssl/src/crypto/Makefile | 4 +- src/lib/libssl/src/crypto/asn1/a_int.c | 3 +- src/lib/libssl/src/crypto/asn1/a_object.c | 4 +- src/lib/libssl/src/crypto/asn1/a_strex.c | 17 +- src/lib/libssl/src/crypto/asn1/a_strnid.c | 2 +- src/lib/libssl/src/crypto/asn1/asn1.h | 2 +- src/lib/libssl/src/crypto/asn1/n_pkey.c | 3 +- src/lib/libssl/src/crypto/asn1/t_crl.c | 3 +- src/lib/libssl/src/crypto/asn1/tasn_dec.c | 3 +- src/lib/libssl/src/crypto/asn1/x_name.c | 7 +- src/lib/libssl/src/crypto/asn1/x_x509.c | 4 +- src/lib/libssl/src/crypto/bio/b_sock.c | 29 +- src/lib/libssl/src/crypto/bio/bf_nbio.c | 2 - src/lib/libssl/src/crypto/bio/bio_lib.c | 4 +- src/lib/libssl/src/crypto/bio/bss_acpt.c | 5 +- src/lib/libssl/src/crypto/bio/bss_file.c | 12 +- src/lib/libssl/src/crypto/bio/bss_log.c | 32 +- src/lib/libssl/src/crypto/bn/bn.h | 18 + src/lib/libssl/src/crypto/bn/bn_exp2.c | 3 +- src/lib/libssl/src/crypto/bn/bn_mont.c | 2 +- src/lib/libssl/src/crypto/bn/bn_mul.c | 9 +- src/lib/libssl/src/crypto/comp/c_rle.c | 3 +- src/lib/libssl/src/crypto/conf/conf_api.c | 3 +- src/lib/libssl/src/crypto/conf/conf_def.c | 13 +- src/lib/libssl/src/crypto/cryptlib.c | 21 +- src/lib/libssl/src/crypto/crypto-lib.com | 339 ++++++++++++----- src/lib/libssl/src/crypto/dsa/dsa_gen.c | 3 +- src/lib/libssl/src/crypto/dsa/dsa_ossl.c | 20 +- src/lib/libssl/src/crypto/dso/dso_dlfcn.c | 1 + src/lib/libssl/src/crypto/dso/dso_vms.c | 179 +++++---- src/lib/libssl/src/crypto/ec/ec_mult.c | 6 +- src/lib/libssl/src/crypto/ec/ecp_smpl.c | 3 + src/lib/libssl/src/crypto/engine/engine.h | 3 + src/lib/libssl/src/crypto/evp/encode.c | 3 +- src/lib/libssl/src/crypto/evp/evp_enc.c | 1 + src/lib/libssl/src/crypto/evp/evp_test.c | 1 + src/lib/libssl/src/crypto/evp/p_lib.c | 3 + src/lib/libssl/src/crypto/evp/p_sign.c | 2 +- src/lib/libssl/src/crypto/evp/p_verify.c | 2 +- src/lib/libssl/src/crypto/hmac/hmac.c | 3 - src/lib/libssl/src/crypto/install-crypto.com | 196 ++++++++++ src/lib/libssl/src/crypto/md32_common.h | 15 +- src/lib/libssl/src/crypto/o_time.c | 22 +- src/lib/libssl/src/crypto/ocsp/ocsp_ht.c | 12 +- src/lib/libssl/src/crypto/ocsp/ocsp_lib.c | 8 +- src/lib/libssl/src/crypto/ocsp/ocsp_prn.c | 2 - src/lib/libssl/src/crypto/opensslv.h | 6 +- src/lib/libssl/src/crypto/pem/pem_lib.c | 2 - src/lib/libssl/src/crypto/perlasm/cbc.pl | 2 - src/lib/libssl/src/crypto/pkcs12/p12_key.c | 38 +- src/lib/libssl/src/crypto/pkcs7/pk7_doit.c | 3 - src/lib/libssl/src/crypto/pkcs7/pk7_lib.c | 2 - src/lib/libssl/src/crypto/rand/md_rand.c | 11 +- src/lib/libssl/src/crypto/rand/rand_vms.c | 16 +- src/lib/libssl/src/crypto/rand/randfile.c | 6 +- src/lib/libssl/src/crypto/rc5/rc5_locl.h | 4 +- src/lib/libssl/src/crypto/rsa/rsa_eay.c | 2 +- src/lib/libssl/src/crypto/rsa/rsa_oaep.c | 20 +- src/lib/libssl/src/crypto/stack/safestack.h | 115 +++--- src/lib/libssl/src/crypto/x509/x509.h | 1 + src/lib/libssl/src/crypto/x509/x509_vfy.c | 6 +- src/lib/libssl/src/crypto/x509/x_all.c | 1 + src/lib/libssl/src/doc/apps/smime.pod | 8 +- .../src/doc/crypto/EVP_PKEY_verifyrecover.pod | 2 +- src/lib/libssl/src/doc/ssl/SSL_CTX_set_options.pod | 13 +- src/lib/libssl/src/doc/ssl/ssl.pod | 2 +- src/lib/libssl/src/engines/makeengines.com | 302 +++++++++++---- src/lib/libssl/src/install.com | 219 ++++++----- src/lib/libssl/src/makevms.com | 404 +++++++++++++++------ src/lib/libssl/src/ms/uplink.c | 3 +- src/lib/libssl/src/openssl.spec | 6 +- src/lib/libssl/src/ssl/bio_ssl.c | 4 + src/lib/libssl/src/ssl/install-ssl.com | 136 +++++++ src/lib/libssl/src/ssl/s23_lib.c | 7 - src/lib/libssl/src/ssl/s2_srvr.c | 7 +- src/lib/libssl/src/ssl/s3_clnt.c | 6 + src/lib/libssl/src/ssl/s3_enc.c | 3 +- src/lib/libssl/src/ssl/s3_lib.c | 6 + src/lib/libssl/src/ssl/s3_pkt.c | 6 +- src/lib/libssl/src/ssl/s3_srvr.c | 41 ++- src/lib/libssl/src/ssl/ssl-lib.com | 295 +++++++++++---- src/lib/libssl/src/ssl/ssl_asn1.c | 3 +- src/lib/libssl/src/ssl/ssl_ciph.c | 6 +- src/lib/libssl/src/ssl/ssl_lib.c | 47 +-- src/lib/libssl/src/ssl/ssltest.c | 3 - src/lib/libssl/src/ssl/t1_enc.c | 14 +- src/lib/libssl/src/ssl/t1_lib.c | 88 +++-- src/lib/libssl/src/test/bctest.com | 152 ++++++++ src/lib/libssl/src/test/bntest.com | 76 ++++ src/lib/libssl/src/test/clean_test.com | 35 ++ src/lib/libssl/src/test/maketests.com | 309 ++++++++++++---- src/lib/libssl/src/test/tcrl.com | 13 +- src/lib/libssl/src/test/testca.com | 8 +- src/lib/libssl/src/test/testenc.com | 13 +- src/lib/libssl/src/test/testgen.com | 22 +- src/lib/libssl/src/test/tests.com | 167 ++++++--- src/lib/libssl/src/test/testss.com | 17 +- src/lib/libssl/src/test/testssl.com | 26 +- src/lib/libssl/src/test/testtsa.com | 65 ++-- src/lib/libssl/src/test/tpkcs7.com | 13 +- src/lib/libssl/src/test/tpkcs7d.com | 13 +- src/lib/libssl/src/test/treq.com | 13 +- src/lib/libssl/src/test/trsa.com | 13 +- src/lib/libssl/src/test/tsid.com | 13 +- src/lib/libssl/src/test/tverify.com | 10 +- src/lib/libssl/src/test/tx509.com | 13 +- src/lib/libssl/src/util/cygwin.sh | 11 +- src/lib/libssl/src/util/libeay.num | 16 + src/lib/libssl/src/util/mk1mf.pl | 20 +- src/lib/libssl/src/util/mkdef.pl | 3 + src/lib/libssl/src/util/mkerr.pl | 4 +- src/lib/libssl/src/util/mkstack.pl | 20 +- src/lib/libssl/src/util/pl/VC-32.pl | 6 +- 147 files changed, 4010 insertions(+), 1391 deletions(-) create mode 100755 src/lib/libssl/src/VMS/install-vms.com create mode 100755 src/lib/libssl/src/VMS/openssl_startup.com create mode 100755 src/lib/libssl/src/VMS/openssl_undo.com create mode 100755 src/lib/libssl/src/apps/install-apps.com create mode 100755 src/lib/libssl/src/crypto/install-crypto.com create mode 100755 src/lib/libssl/src/ssl/install-ssl.com create mode 100644 src/lib/libssl/src/test/bctest.com create mode 100644 src/lib/libssl/src/test/bntest.com create mode 100755 src/lib/libssl/src/test/clean_test.com (limited to 'src/lib/libssl/src') diff --git a/src/lib/libssl/src/CHANGES b/src/lib/libssl/src/CHANGES index b139cf6244..a0de5abb60 100644 --- a/src/lib/libssl/src/CHANGES +++ b/src/lib/libssl/src/CHANGES @@ -2,6 +2,64 @@ OpenSSL CHANGES _______________ + Changes between 1.0.0d and 1.0.0e [6 Sep 2011] + + *) Fix bug where CRLs with nextUpdate in the past are sometimes accepted + by initialising X509_STORE_CTX properly. (CVE-2011-3207) + [Kaspar Brand ] + + *) Fix SSL memory handling for (EC)DH ciphersuites, in particular + for multi-threaded use of ECDH. (CVE-2011-3210) + [Adam Langley (Google)] + + *) Fix x509_name_ex_d2i memory leak on bad inputs. + [Bodo Moeller] + + *) Remove hard coded ecdsaWithSHA1 signature tests in ssl code and check + signature public key algorithm by using OID xref utilities instead. + Before this you could only use some ECC ciphersuites with SHA1 only. + [Steve Henson] + + *) Add protection against ECDSA timing attacks as mentioned in the paper + by Billy Bob Brumley and Nicola Tuveri, see: + + http://eprint.iacr.org/2011/232.pdf + + [Billy Bob Brumley and Nicola Tuveri] + + Changes between 1.0.0c and 1.0.0d [8 Feb 2011] + + *) Fix parsing of OCSP stapling ClientHello extension. CVE-2011-0014 + [Neel Mehta, Adam Langley, Bodo Moeller (Google)] + + *) Fix bug in string printing code: if *any* escaping is enabled we must + escape the escape character (backslash) or the resulting string is + ambiguous. + [Steve Henson] + + Changes between 1.0.0b and 1.0.0c [2 Dec 2010] + + *) Disable code workaround for ancient and obsolete Netscape browsers + and servers: an attacker can use it in a ciphersuite downgrade attack. + Thanks to Martin Rex for discovering this bug. CVE-2010-4180 + [Steve Henson] + + *) Fixed J-PAKE implementation error, originally discovered by + Sebastien Martini, further info and confirmation from Stefan + Arentz and Feng Hao. Note that this fix is a security fix. CVE-2010-4252 + [Ben Laurie] + + Changes between 1.0.0a and 1.0.0b [16 Nov 2010] + + *) Fix extension code to avoid race conditions which can result in a buffer + overrun vulnerability: resumed sessions must not be modified as they can + be shared by multiple threads. CVE-2010-3864 + [Steve Henson] + + *) Fix WIN32 build system to correctly link an ENGINE directory into + a DLL. + [Steve Henson] + Changes between 1.0.0 and 1.0.0a [01 Jun 2010] *) Check return value of int_rsa_verify in pkey_rsa_verifyrecover @@ -849,7 +907,73 @@ *) Change 'Configure' script to enable Camellia by default. [NTT] - Changes between 0.9.8n and 0.9.8o [xx XXX xxxx] + Changes between 0.9.8r and 0.9.8s [xx XXX xxxx] + + *) Fix SSL memory handling for (EC)DH ciphersuites, in particular + for multi-threaded use of ECDH. + [Adam Langley (Google)] + + *) Fix x509_name_ex_d2i memory leak on bad inputs. + [Bodo Moeller] + + *) Add protection against ECDSA timing attacks as mentioned in the paper + by Billy Bob Brumley and Nicola Tuveri, see: + + http://eprint.iacr.org/2011/232.pdf + + [Billy Bob Brumley and Nicola Tuveri] + + Changes between 0.9.8q and 0.9.8r [8 Feb 2011] + + *) Fix parsing of OCSP stapling ClientHello extension. CVE-2011-0014 + [Neel Mehta, Adam Langley, Bodo Moeller (Google)] + + *) Fix bug in string printing code: if *any* escaping is enabled we must + escape the escape character (backslash) or the resulting string is + ambiguous. + [Steve Henson] + + Changes between 0.9.8p and 0.9.8q [2 Dec 2010] + + *) Disable code workaround for ancient and obsolete Netscape browsers + and servers: an attacker can use it in a ciphersuite downgrade attack. + Thanks to Martin Rex for discovering this bug. CVE-2010-4180 + [Steve Henson] + + *) Fixed J-PAKE implementation error, originally discovered by + Sebastien Martini, further info and confirmation from Stefan + Arentz and Feng Hao. Note that this fix is a security fix. CVE-2010-4252 + [Ben Laurie] + + Changes between 0.9.8o and 0.9.8p [16 Nov 2010] + + *) Fix extension code to avoid race conditions which can result in a buffer + overrun vulnerability: resumed sessions must not be modified as they can + be shared by multiple threads. CVE-2010-3864 + [Steve Henson] + + *) Fix for double free bug in ssl/s3_clnt.c CVE-2010-2939 + [Steve Henson] + + *) Don't reencode certificate when calculating signature: cache and use + the original encoding instead. This makes signature verification of + some broken encodings work correctly. + [Steve Henson] + + *) ec2_GF2m_simple_mul bugfix: compute correct result if the output EC_POINT + is also one of the inputs. + [Emilia Käsper (Google)] + + *) Don't repeatedly append PBE algorithms to table if they already exist. + Sort table on each new add. This effectively makes the table read only + after all algorithms are added and subsequent calls to PKCS12_pbe_add + etc are non-op. + [Steve Henson] + + Changes between 0.9.8n and 0.9.8o [01 Jun 2010] + + [NB: OpenSSL 0.9.8o and later 0.9.8 patch levels were released after + OpenSSL 1.0.0.] *) Correct a typo in the CMS ASN1 module which can result in invalid memory access or freeing data twice (CVE-2010-0742) @@ -860,6 +984,12 @@ SSL_library_init and not OpenSSL_add_all_algorithms() will fail. [Steve Henson] + *) VMS fixes: + Reduce copying into .apps and .test in makevms.com + Don't try to use blank CA certificate in CA.com + Allow use of C files from original directories in maketests.com + [Steven M. Schweda" ] + Changes between 0.9.8m and 0.9.8n [24 Mar 2010] *) When rejecting SSL/TLS records due to an incorrect version number, never @@ -868,8 +998,8 @@ - OpenSSL 0.9.8f if 'short' is longer than 16 bits, the previous behavior could result in a read attempt at NULL when receiving specific incorrect SSL/TLS records once record payload - protection is active. (CVE-2010-####) - [Bodo Moeller, Adam Langley] + protection is active. (CVE-2010-0740) + [Bodo Moeller, Adam Langley ] *) Fix for CVE-2010-0433 where some kerberos enabled versions of OpenSSL could be crashed if the relevant tables were not present (e.g. chrooted). diff --git a/src/lib/libssl/src/Configure b/src/lib/libssl/src/Configure index e3b13b9d43..429ab2e5eb 100644 --- a/src/lib/libssl/src/Configure +++ b/src/lib/libssl/src/Configure @@ -492,6 +492,8 @@ my %table=( # Win64 targets, WIN64I denotes IA-64 and WIN64A - AMD64 "VC-WIN64I","cl:-W3 -Gs0 -Gy -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DUNICODE -D_UNICODE -D_CRT_SECURE_NO_DEPRECATE:::WIN64I::SIXTY_FOUR_BIT RC4_CHUNK_LL DES_INT EXPORT_VAR_AS_FN:ia64cpuid.o:ia64.o::aes_core.o aes_cbc.o aes-ia64.o::md5-ia64.o:sha1-ia64.o sha256-ia64.o sha512-ia64.o:::::::ias:win32", "VC-WIN64A","cl:-W3 -Gs0 -Gy -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DUNICODE -D_UNICODE -D_CRT_SECURE_NO_DEPRECATE:::WIN64A::SIXTY_FOUR_BIT RC4_CHUNK_LL DES_INT EXPORT_VAR_AS_FN:x86_64cpuid.o:bn_asm.o x86_64-mont.o::aes-x86_64.o::md5-x86_64.o:sha1-x86_64.o sha256-x86_64.o sha512-x86_64.o::rc4-x86_64.o:::wp-x86_64.o:cmll-x86_64.o cmll_misc.o:auto:win32", +"debug-VC-WIN64I","cl:-W3 -Gs0 -Gy -Zi -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DUNICODE -D_UNICODE -D_CRT_SECURE_NO_DEPRECATE:::WIN64I::SIXTY_FOUR_BIT RC4_CHUNK_LL DES_INT EXPORT_VAR_AS_FN:ia64cpuid.o:ia64.o::aes_core.o aes_cbc.o aes-ia64.o::md5-ia64.o:sha1-ia64.o sha256-ia64.o sha512-ia64.o:::::::ias:win32", +"debug-VC-WIN64A","cl:-W3 -Gs0 -Gy -Zi -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -DUNICODE -D_UNICODE -D_CRT_SECURE_NO_DEPRECATE:::WIN64A::SIXTY_FOUR_BIT RC4_CHUNK_LL DES_INT EXPORT_VAR_AS_FN:x86_64cpuid.o:bn_asm.o x86_64-mont.o::aes-x86_64.o::md5-x86_64.o:sha1-x86_64.o sha256-x86_64.o sha512-x86_64.o::rc4-x86_64.o:::wp-x86_64.o:cmll-x86_64.o cmll_misc.o:auto:win32", # x86 Win32 target defaults to ANSI API, if you want UNICODE, complement # 'perl Configure VC-WIN32' with '-DUNICODE -D_UNICODE' "VC-WIN32","cl:-W3 -WX -Gs0 -GF -Gy -nologo -DOPENSSL_SYSNAME_WIN32 -DWIN32_LEAN_AND_MEAN -DL_ENDIAN -D_CRT_SECURE_NO_DEPRECATE:::WIN32::BN_LLONG RC4_INDEX EXPORT_VAR_AS_FN ${x86_gcc_opts}:${x86_asm}:win32n:win32", @@ -583,6 +585,7 @@ my %table=( ); my @MK1MF_Builds=qw(VC-WIN64I VC-WIN64A + debug-VC-WIN64I debug-VC-WIN64A VC-NT VC-CE VC-WIN32 debug-VC-WIN32 BC-32 netware-clib netware-clib-bsdsock @@ -1093,6 +1096,12 @@ my $ar = $ENV{'AR'} || "ar"; my $arflags = $fields[$idx_arflags]; my $multilib = $fields[$idx_multilib]; +# if $prefix/lib$multilib is not an existing directory, then +# assume that it's not searched by linker automatically, in +# which case adding $multilib suffix causes more grief than +# we're ready to tolerate, so don't... +$multilib="" if !-d "$prefix/lib$multilib"; + $libdir="lib$multilib" if $libdir eq ""; $cflags = "$cflags$exp_cflags"; @@ -1102,6 +1111,12 @@ my ($prelflags,$postlflags)=split('%',$lflags); if (defined($postlflags)) { $lflags=$postlflags; } else { $lflags=$prelflags; undef $prelflags; } +if ($target =~ /^mingw/ && `$cc --target-help 2>&1` !~ m/\-mno\-cygwin/m) + { + $cflags =~ s/\-mno\-cygwin\s*//; + $shared_ldflag =~ s/\-mno\-cygwin\s*//; + } + my $no_shared_warn=0; my $no_user_cflags=0; diff --git a/src/lib/libssl/src/FAQ b/src/lib/libssl/src/FAQ index becee6663f..fe54856a62 100644 --- a/src/lib/libssl/src/FAQ +++ b/src/lib/libssl/src/FAQ @@ -52,6 +52,9 @@ OpenSSL - Frequently Asked Questions * Why does the OpenSSL test suite fail in sha512t on x86 CPU? * Why does compiler fail to compile sha512.c? * Test suite still fails, what to do? +* I think I've found a bug, what should I do? +* I'm SURE I've found a bug, how do I report it? +* I've found a security issue, how do I report it? [PROG] Questions about programming with OpenSSL @@ -79,7 +82,7 @@ OpenSSL - Frequently Asked Questions * Which is the current version of OpenSSL? The current version is available from . -OpenSSL 1.0.0a was released on Jun 1st, 2010. +OpenSSL 1.0.0e was released on Sep 6th, 2011. In addition to the current stable release, you can also access daily snapshots of the OpenSSL development version at . Some applications that use OpenSSL are distributed in binary form. When using such an application, you don't need to install OpenSSL @@ -463,7 +466,7 @@ administrators. Other projects do have other policies so you can for example extract the CA bundle used by Mozilla and/or modssl as described in this article: - http://www.mail-archive.com/modssl-users@modssl.org/msg16980.html + [BUILD] ======================================================================= @@ -505,7 +508,7 @@ when you run the test suite (using "make test"). The message returned is "bc: 1 not implemented". The best way to deal with this is to find another implementation of bc -and compile/install it. GNU bc (see http://www.gnu.org/software/software.html +and compile/install it. GNU bc (see for download instructions) can be safely used, for example. @@ -516,7 +519,7 @@ that the OpenSSL bntest throws at it. This gets triggered when you run the test suite (using "make test"). The message returned is "bc: stack empty". The best way to deal with this is to find another implementation of bc -and compile/install it. GNU bc (see http://www.gnu.org/software/software.html +and compile/install it. GNU bc (see for download instructions) can be safely used, for example. @@ -709,6 +712,46 @@ never make sense, and tend to emerge when you least expect them. In order to identify one, drop optimization level, e.g. by editing CFLAG line in top-level Makefile, recompile and re-run the test. +* I think I've found a bug, what should I do? + +If you are a new user then it is quite likely you haven't found a bug and +something is happening you aren't familiar with. Check this FAQ, the associated +documentation and the mailing lists for similar queries. If you are still +unsure whether it is a bug or not submit a query to the openssl-users mailing +list. + + +* I'm SURE I've found a bug, how do I report it? + +Bug reports with no security implications should be sent to the request +tracker. This can be done by mailing the report to (or its +alias ), please note that messages sent to the +request tracker also appear in the public openssl-dev mailing list. + +The report should be in plain text. Any patches should be sent as +plain text attachments because some mailers corrupt patches sent inline. +If your issue affects multiple versions of OpenSSL check any patches apply +cleanly and, if possible include patches to each affected version. + +The report should be given a meaningful subject line briefly summarising the +issue. Just "bug in OpenSSL" or "bug in OpenSSL 0.9.8n" is not very helpful. + +By sending reports to the request tracker the bug can then be given a priority +and assigned to the appropriate maintainer. The history of discussions can be +accessed and if the issue has been addressed or a reason why not. If patches +are only sent to openssl-dev they can be mislaid if a team member has to +wade through months of old messages to review the discussion. + +See also + + +* I've found a security issue, how do I report it? + +If you think your bug has security implications then please send it to +openssl-security@openssl.org if you don't get a prompt reply at least +acknowledging receipt then resend or mail it directly to one of the +more active team members (e.g. Steve). + [PROG] ======================================================================== * Is OpenSSL thread-safe? diff --git a/src/lib/libssl/src/INSTALL.VMS b/src/lib/libssl/src/INSTALL.VMS index 7658f64e1d..e5d43a57ab 100644 --- a/src/lib/libssl/src/INSTALL.VMS +++ b/src/lib/libssl/src/INSTALL.VMS @@ -71,7 +71,7 @@ the top to understand how to use them. However, if you want to compile all you can get, the simplest is to use MAKEVMS.COM in the top directory. The syntax is the following: - @MAKEVMS